User Authentication
3-79
3
•
Private Password
– Password stored in the private key file. This password is used
to verify authorization for certificate use, and is verified when downloading the
certificate to the switch.
Web
– Click Security, HTTPS Settings. Fill in the TFTP server, certificate and private
file name details, then click Copy Certificate.
Figure 3-47 HTTPS Settings
CLI
– This example copies the certificate file from the designated TFTP server.
Note:
The switch must be reset for the new certificate to be activated. To reset the
switch, See “Resetting the System” on page 3-34 or type:
Console#reload
Configuring the Secure Shell
The Berkeley-standard includes remote access tools originally designed for Unix
systems. Some of these tools have also been implemented for Microsoft Windows
and other environments. These tools, including commands such as
rlogin
(remote
login),
rsh
(remote shell), and
rcp
(remote copy), are not secure from hostile attacks.
The Secure Shell (SSH) includes server/client applications intended as a secure
replacement for the older Berkeley remote access tools. SSH can also provide
remote management access to this switch as a secure replacement for Telnet.
When the client contacts the switch via the SSH protocol, the switch generates a
public-key that the client uses along with a local user name and password for access
authentication. SSH also encrypts all data transfers passing between the switch and
SSH-enabled management station clients, and ensures that data traveling over the
network arrives unaltered.
Console#copy tftp https-certificate
TFTP server ip address: <
server ip-address
>
Source certificate file name: <
certificate file name
>
Source private file name: <
private key file name
>
Private password: <
password for private key
>
Summary of Contents for iES4024GP
Page 1: ...iES4028F 4028FP 4024GP ...
Page 4: ...iv This page is intentionally left blank ...
Page 10: ...x This page is intentionally left blank ...
Page 28: ...Contents xxviii This page is intentionally left blank ...
Page 32: ...Tables xxxii This page is intentionally left blank ...
Page 46: ...Introduction 1 10 1 This page is intentionally left blank ...
Page 336: ...Configuring the Switch 3 280 3 This page is intentionally left blank ...
Page 688: ...Command Line Interface 4 352 4 This page is intentionally left blank ...
Page 702: ...Glossary Glossary 8 This page is intentionally left blank ...
Page 710: ...Index 8 Index This page is intentionally left blank ...
Page 711: ...This page is intentionally left blank ...
Page 712: ...iES4028F 4028FP 4024GP ...